<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>MichaelZimmer.org</title>
	<atom:link href="https://michaelzimmer.org/feed/" rel="self" type="application/rss+xml" />
	<link>https://michaelzimmer.org</link>
	<description>Michael Zimmer, PhD, is a privacy and data ethics scholar at Marquette University</description>
	<lastBuildDate>Fri, 27 Nov 2020 05:27:08 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>

<image>
	<url>https://michaelzimmer.org/wp-content/uploads/2024/11/cropped-2024-michael-zimmer-v-001-edited.jpeg?w=32</url>
	<title>MichaelZimmer.org</title>
	<link>https://michaelzimmer.org</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">59307</site><cloud domain='michaelzimmer.org' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<atom:link rel="search" type="application/opensearchdescription+xml" href="https://michaelzimmer.org/osd.xml" title="MichaelZimmer.org" />
	<atom:link rel='hub' href='https://michaelzimmer.org/?pushpress=hub'/>
	<item>
		<title>Joining Marquette University&#8217;s New Department of Computer Science</title>
		<link>https://michaelzimmer.org/2018/12/14/joining-marquette-university-department-of-computer-science/</link>
					<comments>https://michaelzimmer.org/2018/12/14/joining-marquette-university-department-of-computer-science/#comments</comments>
		
		<dc:creator><![CDATA[Michael Zimmer]]></dc:creator>
		<pubDate>Fri, 14 Dec 2018 16:15:11 +0000</pubDate>
				<category><![CDATA[Professional]]></category>
		<category><![CDATA[computer science]]></category>
		<category><![CDATA[data science]]></category>
		<category><![CDATA[Marquette]]></category>
		<guid isPermaLink="false">http://www.michaelzimmer.org/?p=7007</guid>

					<description><![CDATA[I&#8217;m excited to announce that starting in August 2019, I will be joining the faculty of the new Department of Computer Science at Marquette University. After over 10 years at UW-Milwaukee, I&#8217;m really looking forward to this new direction in&#x2026; <p class="more-link-container th-uppercase th-text-2xs"><a href="https://michaelzimmer.org/2018/12/14/joining-marquette-university-department-of-computer-science/" class="more-link">Read More <span class="screen-reader-text">Joining Marquette University&#8217;s New Department of Computer&#160;Science</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p class="wp-block-paragraph">I&#8217;m excited to announce that starting in August 2019, I will be joining the faculty of the new <a href="https://www.marquette.edu/computer-science/">Department of Computer Science</a> at <a href="https://www.marquette.edu/">Marquette University</a>. After over <a href="https://www.michaelzimmer.org/2008/04/23/joining-uw-milwaukee-school-of-information-studies/">10 years at UW-Milwaukee</a>, I&#8217;m really looking forward to this new direction in my academic career.</p>



<p class="wp-block-paragraph">Currently housed in the <a href="https://www.marquette.edu/mscs/">Department of Mathematics, Statistics and Computer Science</a> at Marquette, the computer science faculty recently received approval to <a href="https://today.marquette.edu/2019/06/mathematics-statistics-and-computer-science-department-to-split-into-two-departments">create an independent</a> Department of Computer Science, launching in August 2019. This new Department of Computer Science will be centered around a vision to <em>build a strong research and teaching environment for preparing innovation leaders to meet the computing challenges and demands of the 21st century</em>.<br></p>



<p class="wp-block-paragraph">I am really looking forward to contributing my research and teaching expertise in areas of digital privacy and data ethics to help the department fulfill its mission. </p>



<p class="wp-block-paragraph">I also look forward to potential collaborations across the Marquette Campus, including the Law School, the College of Communication’s digital media faculty, and the ethics faculty in the Department of Philosophy. Marquette’s leadership in the newly announced Northwestern Mutual Data Science Institute provides another valuable opprotunity&nbsp;to contribute to the growing focus on data science in Milwaukee. And certainly,&nbsp;my strong commitment to service and public advocacy aligns with the broader mission and Jesuit values of Marquette University.</p>



<p class="wp-block-paragraph">The Department offers a B.S. and M.S. in Computer Science, and a&nbsp;professional terminal M.S. degree in Computing, with strong focus areas in data science, cyber security, and bioinformatics.</p>



<p class="wp-block-paragraph">The Department will also be launching a revamped PhD in Computer Science, providing a flexible curriculum under an interdisciplinary “big tent” approach to computer science research. I look forward to welcoming doctoral students interested in data ethics, human-computer interaction, and related explorations into the ethical, legal, and social implications of computing and information technologies.</p>



<p class="wp-block-paragraph">I will be joining&nbsp;9 computer science faculty who are highly productive, nationally and internationally recognized scholars. The Department is also seeking <a href="https://employment.marquette.edu/postings/10460">two new assistant professors</a>&nbsp;and a <a href="https://employment.marquette.edu/postings/10802">postdoctoral fellow</a> in data science. Please join me in this new adventure!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://michaelzimmer.org/2018/12/14/joining-marquette-university-department-of-computer-science/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7007</post-id>
		<media:content url="https://1.gravatar.com/avatar/ad8b46f4ca66c0a59497e4440cfe788c6d82435306c967f1399c9d505f7cdf47?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">michaelzimmer</media:title>
		</media:content>
	</item>
		<item>
		<title>New Book in the Information Society Series: Weaving the Dark Web</title>
		<link>https://michaelzimmer.org/2018/08/21/new-book-in-the-information-society-series-weaving-the-dark-web/</link>
		
		<dc:creator><![CDATA[Michael Zimmer]]></dc:creator>
		<pubDate>Tue, 21 Aug 2018 16:15:32 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[dark web]]></category>
		<category><![CDATA[information society series]]></category>
		<guid isPermaLink="false">http://www.michaelzimmer.org/?p=6977</guid>

					<description><![CDATA[I&#8217;m excited to share the newest book published in the “Information Society Series” at MIT Press that I co-edit with Laura DeNardis. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P by Robert Gehl Summary An exploration of the Dark Web—websites accessible&#x2026; <p class="more-link-container th-uppercase th-text-2xs"><a href="https://michaelzimmer.org/2018/08/21/new-book-in-the-information-society-series-weaving-the-dark-web/" class="more-link">Read More <span class="screen-reader-text">New Book in the Information Society Series: Weaving the Dark&#160;Web</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>I&#8217;m excited to share the newest book published in the “<a href="https://www.michaelzimmer.org/2012/01/24/2011/09/13/2009/03/10/information-society-series-an-interdisciplinary-book-series-on-technology-law-and-society/" target="_blank" rel="noopener">Information Society Series</a>” at <a href="http://mitpress.mit.edu/books/series/information-society-series" target="_blank" rel="noopener">MIT Press</a> that I co-edit with <a href="http://www.american.edu/soc/faculty/denardis.cfm" target="_blank" rel="noopener">Laura DeNardis</a>.</p>
<blockquote><p><a href="https://mitpress.mit.edu/books/weaving-dark-web"><strong>Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P</strong></a></p>
<p><img data-attachment-id="6978" data-permalink="https://michaelzimmer.org/2018/08/21/new-book-in-the-information-society-series-weaving-the-dark-web/img_5727/" data-orig-file="https://michaelzimmer.org/wp-content/uploads/2020/11/ba0d1-img_5727-e1534868073706.jpg" data-orig-size="3024,4032" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;1.8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;iPhone 8&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1534250299&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;3.99&quot;,&quot;iso&quot;:&quot;40&quot;,&quot;shutter_speed&quot;:&quot;0.066666666666667&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}" data-image-title="IMG_5727" data-image-description="" data-image-caption="" data-medium-file="https://michaelzimmer.org/wp-content/uploads/2020/11/ba0d1-img_5727-e1534868073706.jpg?w=225" data-large-file="https://michaelzimmer.org/wp-content/uploads/2020/11/ba0d1-img_5727-e1534868073706.jpg?w=3024" class="alignright size-medium wp-image-6978" src="https://michaelzimmer.org/wp-content/uploads/2020/11/ba0d1-img_5727-e1534868073706.jpg?w=225&#038;h=300" alt="" width="225" height="300" srcset="https://michaelzimmer.org/wp-content/uploads/2020/11/ba0d1-img_5727-e1534868073706.jpg?w=225&amp;h=300 225w, https://michaelzimmer.org/wp-content/uploads/2020/11/ba0d1-img_5727-e1534868073706.jpg?w=450&amp;h=600 450w, https://michaelzimmer.org/wp-content/uploads/2020/11/ba0d1-img_5727-e1534868073706.jpg?w=72&amp;h=96 72w" sizes="(max-width: 225px) 100vw, 225px" />by <a href="https://www.robertwgehl.org/">Robert Gehl</a></p>
<p><strong>Summary</strong><br />
<em>An exploration of the Dark Web—websites accessible only with special routing software—that examines the history of three anonymizing networks, Freenet, Tor, and I2P.</em></p>
<p>The term “Dark Web” conjures up drug markets, unregulated gun sales, stolen credit cards. But, as Robert Gehl points out in Weaving the Dark Web, for each of these illegitimate uses, there are other, legitimate ones: the New York Times&#8217;s anonymous whistleblowing system, for example, and the use of encryption by political dissidents. Defining the Dark Web straightforwardly as websites that can be accessed only with special routing software, and noting the frequent use of “legitimate” and its variations by users, journalists, and law enforcement to describe Dark Web practices (judging them “legit” or “sh!t”), Gehl uses the concept of legitimacy as a window into the Dark Web. He does so by examining the history of three Dark Web systems: Freenet, Tor, and I2P. Gehl presents three distinct meanings of legitimate: legitimate force, or the state&#8217;s claim to a monopoly on violence; organizational propriety; and authenticity. He explores how Freenet, Tor, and I2P grappled with these different meanings, and then discusses each form of legitimacy in detail by examining Dark Web markets, search engines, and social networking sites. Finally, taking a broader view of the Dark Web, Gehl argues for the value of anonymous political speech in a time of ubiquitous surveillance. If we shut down the Dark Web, he argues, we lose a valuable channel for dissent.</p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6977</post-id>
		<media:content url="https://1.gravatar.com/avatar/ad8b46f4ca66c0a59497e4440cfe788c6d82435306c967f1399c9d505f7cdf47?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">michaelzimmer</media:title>
		</media:content>

		<media:content url="https://michaelzimmer.org/wp-content/uploads/2020/11/ba0d1-img_5727-e1534868073706.jpg?w=225&#038;h=300" medium="image" />
	</item>
		<item>
		<title>Project Report: “Library Values &#038; Privacy in our National Digital Strategies: Field guides, Convenings, and Conversations”</title>
		<link>https://michaelzimmer.org/2018/08/02/project-report-library-values-privacy/</link>
		
		<dc:creator><![CDATA[Michael Zimmer]]></dc:creator>
		<pubDate>Thu, 02 Aug 2018 22:47:59 +0000</pubDate>
				<category><![CDATA[Academic]]></category>
		<category><![CDATA[Libraries]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[imls]]></category>
		<guid isPermaLink="false">http://www.michaelzimmer.org/?p=6965</guid>

					<description><![CDATA[Over at the Center for Information Policy Research, we&#8217;ve posted the final report for the IMLS-funded project “Library Values &#38; Privacy in our National Digital Strategies: Field guides, Convenings, and Conversations” which I&#8217;ve been working on over the past year with Bonnie Tijerina at Data &#38; Society. From&#x2026; <p class="more-link-container th-uppercase th-text-2xs"><a href="https://michaelzimmer.org/2018/08/02/project-report-library-values-privacy/" class="more-link">Read More <span class="screen-reader-text">Project Report: “Library Values &#38; Privacy in our National Digital Strategies: Field guides, Convenings, and&#160;Conversations”</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>Over at the <a href="http://cipr.uwm.edu/2018/08/02/project-report-library-values-privacy/">Center for Information Policy Research</a>, we&#8217;ve posted <span class="s1">the <a href="https://cpb-us-w2.wpmucdn.com/people.uwm.edu/dist/b/524/files/2018/08/LibraryValuesAndPrivacy_Report-28qqhtp.pdf">final report</a> for the <a href="https://cipr.uwm.edu/2017/04/18/imls-grant-for-library-values-privacy-in-our-national-digital-strategies/">IMLS-funded</a> project “<a href="https://www.imls.gov/news-events/news-releases/imls-awards-97-million-librarian-training-and-excellence-field">Library Values &amp; Privacy in our National Digital Strategies: Field guides, Convenings, and Conversations</a>” which I&#8217;ve been working on over the past year with <a href="https://datasociety.net/people/tijerina-bonnie/">Bonnie Tijerina</a> at Data &amp; Society.</span></p>
<p>From the <a href="https://cpb-us-w2.wpmucdn.com/people.uwm.edu/dist/b/524/files/2018/08/LibraryValuesAndPrivacy_Report-28qqhtp.pdf">report&#8217;s</a> introduction:</p>
<article id="post-808" class="post-808 post type-post status-publish format-standard hentry category-news category-projects tag-imls tag-libraries tag-privacy">
<div class="entry-content">
<blockquote><p>T<a href="http://cipr.uwm.edu/2018/08/02/project-report-library-values-privacy/"><img data-attachment-id="6966" data-permalink="https://michaelzimmer.org/2018/08/02/project-report-library-values-privacy/screen-shot-2018-08-01-at-11-07-42-pm/" data-orig-file="https://michaelzimmer.org/wp-content/uploads/2020/11/6e44a-screen-shot-2018-08-01-at-11.07.42-pm.png" data-orig-size="491,594" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Screen Shot 2018-08-01 at 11.07.42 PM" data-image-description="" data-image-caption="" data-medium-file="https://michaelzimmer.org/wp-content/uploads/2020/11/6e44a-screen-shot-2018-08-01-at-11.07.42-pm.png?w=248" data-large-file="https://michaelzimmer.org/wp-content/uploads/2020/11/6e44a-screen-shot-2018-08-01-at-11.07.42-pm.png?w=491" class="alignright  wp-image-6966" src="https://www.michaelzimmer.org/wp-content/uploads/2018/08/Screen-Shot-2018-08-01-at-11.07.42-PM-248x300.png" alt="" width="284" height="342" /></a>he UW-Milwaukee Center for Information Policy Research, in partnership with Data &amp; Society, along with the American Library Association’s Office of Intellectual Freedom and the New York Public Library, was awarded a National Leadership Grants for Libraries award from the Institute of Museum and Library Services (IMLS) for the project “<a href="http://cipr.uwm.edu/2017/04/18/imls-grant-for-library-values-privacy-in-our-national-digital-strategies/">Library Values &amp; Privacy in our National Digital Strategies: Field guides, Convenings, and Conversations</a>.” A <a href="http://cipr.uwm.edu/2017/07/10/library-privacy-advocates-gather-for-privacy-pizza-at-ala-annual/">series of gatherings</a> were held throughout 2017-2018 that brought together library practitioners, privacy advocates, and technology experts to discuss and debate a national roadmap for a digital privacy strategy for libraries. The culminating event — <a href="http://cipr.uwm.edu/2018/05/05/library-values-privacy-summit/">the Library Values and Privacy Summit</a> — was held in New York City bringing together privacy experts from within and outside libraries and sparked discussions on key privacy-related issues and possible paths forward.</p></blockquote>
<p class="p1"><span class="s1">You can download the report <a href="https://cipr.uwm.edu/files/2018/08/LibraryValuesAndPrivacy_Report-28qqhtp.pdf">here</a>.</span></p>
<div class="addthis_toolbox addthis_default_style addthis_32x32_style">
<div class="atclear"></div>
</div>
</div>
<footer class="entry-meta"></footer>
</article>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6965</post-id>
		<media:content url="https://1.gravatar.com/avatar/ad8b46f4ca66c0a59497e4440cfe788c6d82435306c967f1399c9d505f7cdf47?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">michaelzimmer</media:title>
		</media:content>

		<media:content url="https://www.michaelzimmer.org/wp-content/uploads/2018/08/Screen-Shot-2018-08-01-at-11.07.42-PM-248x300.png" medium="image" />
	</item>
		<item>
		<title>How Contextual Integrity can help us with Research Ethics in Pervasive Data</title>
		<link>https://michaelzimmer.org/2018/07/25/how-contextual-integrity-can-help-us-with-research-ethics-in-pervasive-data/</link>
		
		<dc:creator><![CDATA[Michael Zimmer]]></dc:creator>
		<pubDate>Wed, 25 Jul 2018 21:44:53 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Internet Research Ethics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Contextual Integrity]]></category>
		<category><![CDATA[data ethics]]></category>
		<category><![CDATA[internet research ethics]]></category>
		<category><![CDATA[pervasive data]]></category>
		<guid isPermaLink="false">http://www.michaelzimmer.org/?p=6959</guid>

					<description><![CDATA[(I posted this earlier today on the PERVADE (Pervasive Data Ethics for Computational Research) team&#8217;s Medium channel) The growth of research projects relying on pervasive data — big datasets about people’s lives and activities that can be collected without them knowing —&#x2026; <p class="more-link-container th-uppercase th-text-2xs"><a href="https://michaelzimmer.org/2018/07/25/how-contextual-integrity-can-help-us-with-research-ethics-in-pervasive-data/" class="more-link">Read More <span class="screen-reader-text">How Contextual Integrity can help us with Research Ethics in Pervasive&#160;Data</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><em>(I <a href="https://medium.com/pervade-team/how-contextual-integrity-can-help-us-with-research-ethics-in-pervasive-data-ef633c974cc1">posted</a> this earlier today on the <a href="http://pervade.umd.edu/">PERVADE</a> (Pervasive Data Ethics for Computational Research) team&#8217;s <a href="https://medium.com/pervade-team">Medium channel</a>)</em></p>
<p id="5e82" class="graf graf--p graf--hasDropCapModel graf--hasDropCap graf-after--h3"><span class="graf-dropCap">T</span>he growth of research projects relying on pervasive data — big datasets about people’s lives and activities that can be collected without them knowing — are testing the ethical frameworks and assumptions traditionally used by researchers and ethical review boards to ensure adequate protection of human subjects.</p>
<p id="7377" class="graf graf--p graf-after--p">For more than a decade, researchers interacting with pervasive data have crafted novel projects and methodologies, while generating considerable ethical controversies. For example:</p>
<ul class="postList">
<li id="1c32" class="graf graf--li graf-after--p">In 2006, <a class="markup--anchor markup--li-anchor" href="https://techcrunch.com/2006/08/06/aol-proudly-releases-massive-amounts-of-user-search-data/" target="_blank" rel="nofollow noopener">AOL released over 20 million search queries from 658,000 users</a> to the public in an attempt to support academic research on search engine usage, resulting in <a class="markup--anchor markup--li-anchor" href="https://www.nytimes.com/2006/08/09/technology/09aol.html" target="_blank" rel="nofollow noopener">individual users being re-identified</a> based on an analysis of their search activities.</li>
<li id="cc80" class="graf graf--li graf-after--li">In 2008, Harvard researchers released the first wave of their “<a class="markup--anchor markup--li-anchor" href="https://www.sciencedirect.com/science/article/pii/S0378873308000385" target="_blank" rel="nofollow noopener">Tastes, Ties and Time</a>” dataset comprising of four years’ worth of complete Facebook profile data harvested from the accounts of an entire cohort of 1,700 college students, <a class="markup--anchor markup--li-anchor" href="https://www.chronicle.com/article/Harvards-Privacy-Meltdown/128166" target="_blank" rel="nofollow noopener">spurring concerns about confidentiality and the lack of consent</a>.</li>
<li id="efd4" class="graf graf--li graf-after--li">In 2010, Pete Warden, a former Apple engineer turned independent researcher, exploited a weakness in Facebook’s architecture to <a class="markup--anchor markup--li-anchor" href="https://readwrite.com/2010/02/08/facebook_user_data_analysis/" target="_blank" rel="noopener nofollow">amass a database of names, fan pages, and lists of friends for 215 million public Facebook accounts</a> which he planned to make public. Under legal pressure from Facebook, Warden ultimately <a class="markup--anchor markup--li-anchor" href="https://www.newscientist.com/article/dn18721-data-sifted-from-facebook-wiped-after-legal-threats/" target="_blank" rel="noopener nofollow">destroyed the database</a>.</li>
<li id="4f39" class="graf graf--li graf-after--li">In 2014, academic researchers, in partnership with Facebook, <a class="markup--anchor markup--li-anchor" href="https://www.theatlantic.com/technology/archive/2014/06/everything-we-know-about-facebooks-secret-mood-manipulation-experiment/373648/" target="_blank" rel="nofollow noopener">sparked an uproar when they altered the emotional content</a> within the news feeds of nearly 700,000 Facebook users to study the impact on users’ mood.</li>
<li id="14f7" class="graf graf--li graf-after--li">In 2016, a group of Danish researchers were <a class="markup--anchor markup--li-anchor" href="https://www.wired.com/2016/05/okcupid-study-reveals-perils-big-data-science/" target="_blank" rel="nofollow noopener">criticized</a> after they <a class="markup--anchor markup--li-anchor" href="https://www.vox.com/2016/5/12/11666116/70000-okcupid-users-data-release" target="_blank" rel="nofollow noopener">publicly released a dataset of nearly 70,000 users of the online dating site OkCupid</a>, including usernames, age, gender, location, what kind of relationship (or sex) they’re interested in, personality traits, and answers to thousands of personal profiling questions.</li>
<li id="a86b" class="graf graf--li graf-after--li">In 2018, news of the <a class="markup--anchor markup--li-anchor" href="https://www.vox.com/2018/4/10/17207394/cambridge-analytica-facebook-zuckerberg-trump-privacy-scandal" target="_blank" rel="nofollow noopener">Facebook–Cambridge Analytica data scandal</a> broke, revealing how personally identifiable information of 87 million Facebook users was improperly harvested in 2014 in order to build psychographic profiles for targeted political advertising.</li>
<li id="c4b1" class="graf graf--li graf-after--li">And just this week, a study of <a class="markup--anchor markup--li-anchor" href="https://hbr.org/2018/07/a-study-of-thousands-of-dropbox-projects-reveals-how-successful-teams-collaborate" target="_blank" rel="nofollow noopener">how teams use collaborative platforms was released</a>, where Dropbox gave researchers access to <a class="markup--anchor markup--li-anchor" href="https://www.zdnet.com/article/dropbox-denies-giving-researchers-non-anonymized-user-data/" target="_blank" rel="nofollow noopener">project-folder-related data over a two-year period from about 400,000 users across 1,000 universities</a>.</li>
</ul>
<p id="a6d9" class="graf graf--p graf-after--li">In each of these examples, researchers hoped to advance our understanding of a phenomenon by analyzing — and in some cases publicly sharing — large collections of pervasive data they considered freely available for analysis. Yet, in each case, controversies about the ethics behind such pervasive data-based projects quickly surfaced. Many of the <a class="markup--anchor markup--p-anchor" href="https://en.wikipedia.org/wiki/Belmont_Report" target="_blank" rel="nofollow noopener">basic tenets of research ethics</a> — such as protecting the privacy of subjects, obtaining informed consent, maintaining the confidentiality of any data collected, and minimizing harm — appeared to be deficient in the researchers’ methodological protocols.</p>
<p id="7890" class="graf graf--p graf--hasDropCapModel graf--hasDropCap graf-after--p"><span class="graf-dropCap">O</span>ver the course of this same decade, a growing number of scholars and advocates have made strides to address many of these ethical lapses, typically working within the domains of <a class="markup--anchor markup--p-anchor" href="https://plato.stanford.edu/entries/ethics-internet-research/" target="_blank" rel="nofollow noopener">internet research ethics</a> and <a class="markup--anchor markup--p-anchor" href="https://bdes.datasociety.net/" target="_blank" rel="nofollow noopener">data ethics</a>. Regulatory authorities responsible for the oversight of human subject research are <a class="markup--anchor markup--p-anchor" href="https://www.hhs.gov/ohrp/sites/default/files/ohrp/sachrp/mtgings/2013%20March%20Mtg/internet_research.pdf" target="_blank" rel="nofollow noopener">starting to confront the myriad of ethical concerns pervasive data research brings to light</a>, and numerous scholarly associations have drafted ethical guidelines for internet research, including the <a class="markup--anchor markup--p-anchor" href="http://www.apa.org/science/leadership/bsa/internet/" target="_blank" rel="nofollow noopener">American Psychological Association’s Advisory Group on Conducting Research on the Internet</a>, the <a class="markup--anchor markup--p-anchor" href="http://aoir.org/ethics/" target="_blank" rel="nofollow noopener">Association of Internet Researchers (AoIR) Ethics Working Group</a>, and the ACM’s <a class="markup--anchor markup--p-anchor" href="https://sigchi.org/people/committees/" target="_blank" rel="nofollow noopener">SIGCHI Research Ethics Committee</a>.</p>
<p id="f1f6" class="graf graf--p graf-after--p">Yet, even with this increased attention and guidance surrounding research ethics, significant gaps in our understanding and practices persist. Across the research community — as glaringly evident in the examples provided above — there is considerable disagreement over basic research ethics questions and policies, such as <a class="markup--anchor markup--p-anchor" href="https://link.springer.com/article/10.1007/s10676-010-9227-5" target="_blank" rel="nofollow noopener">what constitutes “public” data</a>, is <a class="markup--anchor markup--p-anchor" href="https://www.primr.org/podcasts/april1/" target="_blank" rel="nofollow noopener">informed consent necessary</a> when dealing with “found data” or when a <a class="markup--anchor markup--p-anchor" href="https://www.wired.com/story/dropbox-sharing-data-study-ethics/" target="_blank" rel="nofollow noopener">platform’s terms of service might allow sharing data</a> with researchers, and even <a class="markup--anchor markup--p-anchor" href="http://journals.sagepub.com/doi/full/10.1177/2053951716650211" target="_blank" rel="nofollow noopener">at what stage does computational research become human subjects research</a> requiring particular ethical protection. Given all this, there is great uncertainty among the research community on how to address research ethics in the realm of pervasive data.</p>
<p id="9fc2" class="graf graf--p graf--hasDropCapModel graf--hasDropCap graf-after--p"><span class="graf-dropCap">T</span>his uncertainty, however, does not need to lead to paralysis. In the conclusion of our book, <a class="markup--anchor markup--p-anchor" href="https://www.amazon.com/Internet-Research-Ethics-Social-Age/dp/143314266X" target="_blank" rel="nofollow noopener"><em class="markup--em markup--p-em">Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts</em></a>, Katharina Kinder-Kurlanda and I note how:</p>
<blockquote id="a1ae" class="graf graf--blockquote graf-after--p"><p>ethically-informed research practices come out of processes of deliberation and decision making under great uncertainty, which often <a class="markup--anchor markup--blockquote-anchor" href="https://www.amazon.com/Digital-Research-Confidential-Studying-Behavior/dp/0262528207" target="_blank" rel="nofollow noopener">may go wrong or seemingly force us towards less-ideal options</a>.</p></blockquote>
<p id="5dee" class="graf graf--p graf-after--blockquote">We also argue that ethical decision making in the context of internet research cannot be easily governed by blanket rules. For example, if a rule was established that no tweets should ever be quoted to protect users’ privacy and respect the lack of specific informed consent to research being conducted, this could (paternalistically) <a class="markup--anchor markup--p-anchor" href="http://kurtluther.com/pdf/bruckman_real_names.pdf" target="_blank" rel="nofollow noopener">ignore users’ carefully crafted public communications</a> while not acknowledge their agency and authorship.</p>
<p id="b0fd" class="graf graf--p graf-after--p">Faced with this dual challenge of growing uncertainty and the need for flexibility when addressing research ethics in pervasive data, <a class="markup--anchor markup--p-anchor" href="https://tech.cornell.edu/people/helen-nissenbaum/" target="_blank" rel="nofollow noopener">Helen Nissenbaum’s</a> concept of <a class="markup--anchor markup--p-anchor" href="https://www.amazon.com/Privacy-Context-Technology-Policy-Integrity/dp/0804752370" target="_blank" rel="nofollow noopener">contextual integrity</a> emerges as a valuable heuristic to guide researchers.</p>
<figure id="899c" class="graf graf--figure graf-after--p">
<div class="aspectRatioPlaceholder is-locked">
<div class="progressiveMedia js-progressiveMedia graf-image is-canvasLoaded is-imageLoaded"><img class="progressiveMedia-image js-progressiveMedia-image alignright" src="https://michaelzimmer.org/wp-content/uploads/2018/07/4d569-1zl89rqsidmdluu6c0uk5da.jpeg" width="174" height="261" /></div>
</div>
</figure>
<p id="5746" class="graf graf--p graf--hasDropCapModel graf--hasDropCap graf-after--figure"><span class="graf-dropCap">C</span>ontextual integrity is a benchmark theory of privacy, a conceptual framework that links the protection of personal information to the norms of personal information flow within specific contexts. Rejecting the traditional dichotomy of public versus private information, the theory of contextual integrity ties adequate privacy protection to the preservation of informational norms within in specific contexts, providing a framework for evaluating the flow of personal information between agents to help identify and explain why certain patterns of information flow are acceptable in one context, but viewed as problematic in another.</p>
<p id="6e8c" class="graf graf--p graf-after--p">To aid the application of contextual integrity, Nissenbaum provides a nine-step decision heuristic to analyze the significant points of departure created by a new process, thus determining if the new practice represents a potential violation of privacy:</p>
<ol class="postList">
<li id="31a0" class="graf graf--li graf-after--p">Describe the new practice in terms of its information flows.</li>
<li id="59cb" class="graf graf--li graf-after--li">Identify the prevailing context in which the practice takes place at a familiar level of generality, which should be suitably broad such that the impacts of any nested contexts might also be considered.</li>
<li id="278f" class="graf graf--li graf-after--li">Identify the information subjects, senders, and recipients.</li>
<li id="6f9a" class="graf graf--li graf-after--li">Identify the transmission principles: the conditions under which information ought (or ought not) to be shared between parties. These might be social or regulatory constraints, such as the expectation of reciprocity when friends share news, or the obligation for someone with a duty to report illegal activity.</li>
<li id="20fd" class="graf graf--li graf-after--li">Detail the applicable entrenched informational norms within the context, and identify any points of departure the new practice introduces.</li>
<li id="c423" class="graf graf--li graf-after--li">Making a prima facie assessment: there may be a violation of contextual integrity if there are discrepancies in the above norms or practices, or if there are incomplete normative structures in the context to support the new practice.</li>
<li id="cfb4" class="graf graf--li graf-after--li">Evaluation I: Consider the moral and political factors affected by the new practice. How might there be harms or threats to personal freedom or autonomy? Are there impacts on power structures, fairness, justice, or democracy? In some cases, the results might overwhelmingly favor accepting or rejecting the new practice, while in more controversial or difficult cases, further evaluation might be necessary.</li>
<li id="d019" class="graf graf--li graf-after--li">Evaluation II: How does the new practice directly impinge on values, goals, and ends of the particular context? If there are harms or threats to freedom or autonomy, or fairness, justice, or democracy, what do these threats mean in relation to this context?</li>
<li id="c2bf" class="graf graf--li graf-after--li">Finally, on the basis of this evaluation, a determination can be made as to whether the new process violates contextual integrity in consideration of these wider factors.</li>
</ol>
<p id="064a" class="graf graf--p graf-after--li">The first six steps involve modeling the existing and new contexts, allowing a <em class="markup--em markup--p-em">prima facie</em> judgment to be rendered as to whether the new process significantly violates the entrenched norms of the context. These steps help us identify any immediate “red flags” that violate contextual integrity. The final steps of the heuristic involve a wider examination of the moral and political implications of the process to make a recommendation as to whether the new practice should be allowed or resisted.</p>
<p id="63d9" class="graf graf--p graf-after--p">Nissenbaum’s theory of contextual integrity has been applied in numerous contexts where technological developments have forced conceptualizations of privacy to be in a state of flux, including <a class="markup--anchor markup--p-anchor" href="https://link.springer.com/article/10.1007/s10676-006-0016-0" target="_blank" rel="nofollow noopener">vehicle-to-vehicle communication protocols</a>, <a class="markup--anchor markup--p-anchor" href="https://digitalcommons.law.umaryland.edu/jbtl/vol3/iss1/8/" target="_blank" rel="nofollow noopener">search engine privacy</a>, the privacy implications of <a class="markup--anchor markup--p-anchor" href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.847.7889&amp;rep=rep1&amp;type=pdf" target="_blank" rel="nofollow noopener">cloud-based storage platforms</a>, <a class="markup--anchor markup--p-anchor" href="https://www.usenix.org/node/190983" target="_blank" rel="nofollow noopener">smartphone applications</a>, and <a class="markup--anchor markup--p-anchor" href="https://www.tandfonline.com/doi/abs/10.1080/01972243.2016.1130502" target="_blank" rel="nofollow noopener">learning analytics</a>.</p>
<p id="1080" class="graf graf--p graf--hasDropCapModel graf--hasDropCap graf-after--p"><span class="graf-dropCap">C</span>onsidered in the context of pervasive data, contextual integrity is a useful tool for properly addressing the oft-repeated refrains that “<a class="markup--anchor markup--p-anchor" href="https://link.springer.com/article/10.1007/s10676-010-9227-5" target="_blank" rel="nofollow noopener">the data was already public</a>” or “<a class="markup--anchor markup--p-anchor" href="https://www.wired.com/story/dropbox-sharing-data-study-ethics/" target="_blank" rel="nofollow noopener">the terms of service allowed sharing the data without specific consent</a>” when attempting to justify why pervasive data research does not pose a privacy or ethical concern.</p>
<p id="2856" class="graf graf--p graf-after--p">For example, my recent article in <em class="markup--em markup--p-em">Social Media + Society</em>, “<a class="markup--anchor markup--p-anchor" href="http://journals.sagepub.com/doi/10.1177/2056305118768300" target="_blank" rel="nofollow noopener">Addressing Conceptual Gaps in Big Data Research Ethics: An Application of Contextual Integrity</a>”, uses Nissenbaum’s theory to interrogate the ethics of Emil Kirkegaard’s <a class="markup--anchor markup--p-anchor" href="https://www.vox.com/2016/5/12/11666116/70000-okcupid-users-data-release" target="_blank" rel="nofollow noopener">collection and public release</a> of data scraped data from nearly 70,000 users of the OkCupid online dating site.</p>
<p id="1547" class="graf graf--p graf-after--p"><a class="markup--anchor markup--p-anchor" href="https://twitter.com/KirkegaardEmil" target="_blank" rel="nofollow noopener">Kirkegaard</a>, then a graduate student at Aarhus University in Denmark, collected the dataset between November 2014 and March 2015 using a web scraper — an automated tool that extracts data from web pages. After creating an OkCupid profile to gain access to the site, the scraper targeted basic profile information such as username, age, gender, sexual orientation, and location, while also harvesting answers to the 2,600 most popular multiple-choice questions on the site, such as users’ religious and political views, whether they take recreational drugs, if they have been unfaithful to a spouse, or whether users like to be tied up during sex. The resulting database, along with a <a class="markup--anchor markup--p-anchor" href="https://openpsych.net/paper/46" target="_blank" rel="nofollow noopener">draft paper analyzing the data</a>, was posted on the Open Science Framework, a web platform that encourages open source science research and collaboration, as well as to the online peer-review forums of <a class="markup--anchor markup--p-anchor" href="https://openpsych.net/journal/ODP" target="_blank" rel="nofollow noopener"><em class="markup--em markup--p-em">Open Differential Psychology</em></a>, an open-access online journal also run by Kirkegaard.</p>
<p id="65a9" class="graf graf--p graf-after--p">When asked, via Twitter, whether he attempted to anonymize the dataset, Kirkegaard replied bluntly: “<a class="markup--anchor markup--p-anchor" href="https://twitter.com/kirkegaardemil/status/730449904909324289?lang=en" target="_blank" rel="nofollow noopener">No. Data is already public</a>”, a position expanded on in the accompanying draft paper:</p>
<blockquote id="66db" class="graf graf--blockquote graf-after--p"><p>Some may object to the ethics of gathering and releasing this data. However, all the data found in the dataset are or were already publicly available, so releasing this dataset merely presents it in a more useful form. (<a class="markup--anchor markup--blockquote-anchor" href="https://openpsych.net/paper/46" target="_blank" rel="nofollow noopener">Kirkegaard &amp; Bjerrekær, 2016, p. 2</a>)</p></blockquote>
<p id="312a" class="graf graf--p graf-after--blockquote">Kirkegaard <a class="markup--anchor markup--p-anchor" href="http://www.vox.com/2016/5/12/11666116/70000-okcupid-users-data-release" target="_blank" rel="nofollow noopener">further justified</a> the inclusion of usernames in the released data to aid future researchers who might want to “fill in remaining [data]points” such as height, profile text, and even profile photos, which Kirkegaard’s team failed to initially capture due to technical limitations. Based on all available documentation, Kirkegaard did not seek any form of consent — from OkCupid or its users — at any point during the collection, use, and release of the profile data, nor did he obtain any ethics approval or guidance from his institution or related oversight body.</p>
<p id="85ae" class="graf graf--p graf-after--p">Considering Kirkegaard’s OkCupid study, it might be easy to accept that users made certain profile information available on the online dating platform, and all the Danish researchers did was present the data “in a more useful form”. Yet, an analysis of Kirkegaard’s actions through the lens of contextual integrity provides a very different calculus. <a class="markup--anchor markup--p-anchor" href="http://journals.sagepub.com/doi/10.1177/2056305118768300" target="_blank" rel="nofollow noopener">As I argue</a>, when considering the transmission principles and informational norms of the context, we can easily determine that the actions taken by Kirkegaard disrupt contextual integrity. And once we evaluate that disruption in terms of the moral and political values of the users, as well as the broader goals of the context itself, we conclude that the impacts of Kirkegaard’s actions are not justifiable. His disruption of the informational norms within the context of OkCupid brought no benefit — directly or indirectly — to the users or the context, and only degraded the values and goals of the community and its members. This conclusion is in striking contrast to Kirkegaard’s assertion that the supposed “publicness” of the data means little pause is necessary when considering to capture and process thousands of OkCupid profiles.</p>
<p id="7d9b" class="graf graf--p graf-after--p">By demanding that information collection and transmission must be appropriate within a given context, contextual integrity can guide pervasive data researchers’ attentiveness to the normative bounds of how information flows on a particular social network or community under study. Thus, maintaining the contextual integrity of those information flows can help us be attentive to many of the ethical uncertainties that plague pervasive data research ethics.</p>
<p id="fbbc" class="graf graf--p graf--hasDropCapModel graf--hasDropCap graf-after--p graf--trailing"><span class="graf-dropCap">R</span>ather than simply waving the “but the data is already public” or “consent is implied in terms of service” magic wands to make the ethical concerns disappear, walking through contextual integrity’s decision heuristic can provide a much more nuanced — and contextually sensitive — approach to considering the ethics of a particular action or intervention into a research context. Embracing contextual integrity will undoubtedly guide researchers through similar ethical dilemmas in the growing domain of pervasive data research.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6959</post-id>
		<media:content url="https://1.gravatar.com/avatar/ad8b46f4ca66c0a59497e4440cfe788c6d82435306c967f1399c9d505f7cdf47?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">michaelzimmer</media:title>
		</media:content>

		<media:content url="https://michaelzimmer.org/wp-content/uploads/2018/07/4d569-1zl89rqsidmdluu6c0uk5da.jpeg" medium="image" />
	</item>
		<item>
		<title>New article: &#8220;Addressing Conceptual Gaps in Big Data Research Ethics: An Application of Contextual Integrity&#8221;</title>
		<link>https://michaelzimmer.org/2018/06/29/new-article-addressing-conceptual-gaps-in-big-data-research-ethics-an-application-of-contextual-integrity/</link>
		
		<dc:creator><![CDATA[Michael Zimmer]]></dc:creator>
		<pubDate>Fri, 29 Jun 2018 23:28:53 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Internet Research Ethics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[Contextual Integrity]]></category>
		<category><![CDATA[internet research ethics]]></category>
		<category><![CDATA[okcupid]]></category>
		<guid isPermaLink="false">http://www.michaelzimmer.org/?p=6946</guid>

					<description><![CDATA[I&#8217;m happy to share the (open) publication of a new article &#8220;Addressing Conceptual Gaps in Big Data Research Ethics: An Application of Contextual Integrity&#8221; in Social Media + Society. In this article, I revisit the OkCupid data collection and release controversy,&#x2026; <p class="more-link-container th-uppercase th-text-2xs"><a href="https://michaelzimmer.org/2018/06/29/new-article-addressing-conceptual-gaps-in-big-data-research-ethics-an-application-of-contextual-integrity/" class="more-link">Read More <span class="screen-reader-text">New article: &#8220;Addressing Conceptual Gaps in Big Data Research Ethics: An Application of Contextual Integrity&#8221;</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>I&#8217;m happy to share the (open) publication of a new article &#8220;<strong><a href="http://journals.sagepub.com/doi/full/10.1177/2056305118768300">Addressing Conceptual Gaps in Big Data Research Ethics: An Application of Contextual Integrity</a></strong>&#8221; in <em>Social Media + Society</em>.</p>
<p>In this article, I revisit the <a href="https://www.michaelzimmer.org/2016/05/14/okcupid-study-reveals-the-perils-of-big-data-science/">OkCupid data collection</a> and <a href="https://www.michaelzimmer.org/2016/06/03/okcupid-and-the-ethics-of-big-data-research/">release controversy</a>, where a group of Danish researchers, led by Emil O. W. Kirkegaard, <a href="http://openpsych.net/forum/showthread.php?tid=279">publicly released</a> a dataset of nearly 70,000 users of the online dating site OkCupid, including usernames, age, gender, location, what kind of relationship (or sex) they’re interested in, personality traits, and answers to thousands of profiling questions used by the site. To counter Kirkegaard&#8217;s assertion that the &#8220;Data is already public&#8221; and thus concerns about privacy and ethics are irrelevant, I invoke <a href="https://tech.cornell.edu/people/helen-nissenbaum/">Helen Nissenbaum’s</a> theory of “<a href="https://www.amazon.com/Privacy-Context-Technology-Policy-Integrity/dp/0804752370">privacy as contextual integrity</a>” as a useful heuristic to guide ethical decision-making in big data research projects.</p>
<p>Here is the abstract:</p>
<div class="hlFld-Abstract">
<div class="abstractSection abstractInFull">
<blockquote><p>The rise of big data has provided new avenues for researchers to explore, observe, and measure human opinions, activities, and interactions. While scholars, professional societies, and ethical review boards have long-established research ethics frameworks to ensure the rights and welfare of the research subjects are protected, the rapid rise of big data-based research generates new challenges to long-held ethical assumptions and guidelines. This article discloses emerging conceptual gaps in relation to how researchers and ethical review boards think about privacy, anonymity, consent, and harm in the context of big data research. It closes by invoking Nissenbaum’s theory of “privacy as contextual integrity” as a useful heuristic to guide ethical decision-making in big data research projects.</p></blockquote>
</div>
</div>
<div class="abstractKeywords"></div>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6946</post-id>
		<media:content url="https://1.gravatar.com/avatar/ad8b46f4ca66c0a59497e4440cfe788c6d82435306c967f1399c9d505f7cdf47?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">michaelzimmer</media:title>
		</media:content>
	</item>
		<item>
		<title>Posts on Facebook and Privacy (2006-2010)</title>
		<link>https://michaelzimmer.org/2018/04/11/posts-on-facebook-and-privacy/</link>
		
		<dc:creator><![CDATA[Michael Zimmer]]></dc:creator>
		<pubDate>Wed, 11 Apr 2018 12:30:12 +0000</pubDate>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Facebook]]></category>
		<guid isPermaLink="false">http://www.michaelzimmer.org/?p=6922</guid>

					<description><![CDATA[Since 2006, two years after Facebook&#8217;s launch and right about when I joined the platform, I&#8217;ve been posting on this blog (at least as long as blogging was a thing) about numerous privacy concerns related to the social network.Posts include&#x2026; <p class="more-link-container th-uppercase th-text-2xs"><a href="https://michaelzimmer.org/2018/04/11/posts-on-facebook-and-privacy/" class="more-link">Read More <span class="screen-reader-text">Posts on Facebook and Privacy&#160;(2006-2010)</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>Since 2006, two years after Facebook&#8217;s launch and right about when I joined the platform, I&#8217;ve been posting on this blog (at least as long as blogging was a thing) about numerous privacy concerns related to the social network.Posts include reactions to the launch of the News Feed, concerns over profile visibility and APIs, Facebook SocialAds &amp; Beacon, and the numerous times Facebook has messed with user privacy settings &amp; controls. Here&#8217;s a partial chronology:</p>
<ul>
<li><a href="https://www.michaelzimmer.org/2006/09/06/facebook-changes-cause-rift-in-flow-of-personal-information/">Facebook Changes Cause Rift in Flow of Personal Information</a> (Sept 6, 2006)</li>
<li><a href="https://www.michaelzimmer.org/2006/09/08/more-on-facebook-and-the-contextual-integrity-of-personal-information-flows/">More on Facebook and the Contextual Integrity of Personal Information Flows</a> (Sept 8, 2006)</li>
<li><a href="https://www.michaelzimmer.org/2006/09/09/facebook-offers-privacy-fix-but-only-if-you-select-it/">Facebook Offers Privacy Fix, But Only If You Select It</a> (Sept 9, 2006)</li>
<li><a href="https://www.michaelzimmer.org/2007/05/29/facebook-allowing-profiles-to-be-crawled-by-google/">Facebook Allowing Profiles to be Crawled by Google</a> (March 29, 2007)</li>
<li><a href="https://www.michaelzimmer.org/2007/05/25/personal-data-flows-and-apis/">Personal Data Flows and APIs</a> (May 25, 2007)</li>
<li><a href="https://www.michaelzimmer.org/2007/09/07/facebook-to-join-behavioral-targeting-game-and-might-win/">Facebook to Join Behavioral Targeting Game, and Might Win</a> (Sept 7, 2007)</li>
<li><a href="https://www.michaelzimmer.org/2007/09/17/bill-mcgeveran-on-facebook-context-and-privacy/">Bill McGeveran on Facebook, Context, and Privacy</a> (Sept 17, 2007)</li>
<li><a href="https://www.michaelzimmer.org/2007/11/18/link-roundup-on-facebook-socialads-and-privacy/">Link Roundup on Facebook, SocialAds, and Privacy</a> (Nov 18, 2007)</li>
<li><a href="https://www.michaelzimmer.org/2007/11/29/facebook-mulling-privacy-changes-but-will-it-be-sufficient/">Facebook Mulling Privacy Changes, But Will It Be Sufficient?</a> (Nov 29, 2007)</li>
<li><a href="https://www.michaelzimmer.org/2007/11/29/facebook-changes-beacon-to-how-it-should-have-been-designed-in-the-first-place/">Facebook Changes Beacon to How it Should Have Been Designed in the First Place</a> (Nov 29, 2007)</li>
<li><a href="https://www.michaelzimmer.org/2007/12/02/dear-facebook-google-please-engage-in-value-conscious-design/">Dear Facebook, Google: Please Engage in Value-Conscious Design</a> (Dec 2, 2007)</li>
<li><a href="https://www.michaelzimmer.org/2007/12/02/facebook-beacon-worse-than-most-thought-and-still-is/">Facebook Beacon Worse than Most Thought (And Still Is)</a> (Dec 2, 2007)</li>
<li><a href="https://www.michaelzimmer.org/2007/12/06/facebook-apologizes-sorta-creates-global-opt-out-supposedly/">Facebook Apologizes (Sorta); Creates Global Opt-Out (Supposedly)</a> (Dec 6, 2007)</li>
<li><a href="https://www.michaelzimmer.org/2008/01/24/the-illusion-of-private-web-content/">The Illusion of &#8220;Private&#8221; Web Content</a> (Jan 24, 2008)</li>
<li><a href="https://www.michaelzimmer.org/2008/04/06/real-questions-for-facebooks-chief-privacy-officer/">Real Questions for Facebook&#8217;s Chief Privacy Officer</a> (April 6, 2008)</li>
<li><a href="https://www.michaelzimmer.org/2008/09/19/facebook-really-wants-you-to-use-beacon/">Facebook *Really* Wants You to Use Beacon</a> (Sept 19, 2008)</li>
<li><a href="https://www.michaelzimmer.org/2008/11/08/facebooks-zuckerberg-on-increasing-the-streams-of-personal-information-online/">Facebook&#8217;s Zuckerberg on Increasing the Streams of Personal Information Online</a> (Nov 8, 2008)</li>
<li><a href="https://www.michaelzimmer.org/2008/11/18/do-you-trust-this-face-gq-on-mark-zuckerberg/">Do You Trust This Face? GQ on Mark Zuckerberg</a> (Nov 18, 2008)</li>
<li><a href="https://www.michaelzimmer.org/2009/02/16/on-facebook-people-own-and-control-their-information-except-when-facebook-does/">On Facebook, People Own and Control Their Information (Except When Facebook Does)</a> (Feb 16, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2009/02/18/facebook-recants-again/">Facebook Recants (Again)</a> (Feb 18, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2009/02/19/stutzmans-suggestions-for-facebook-to-properly-address-user-rights/">Stutzman’s Suggestions for Facebook to Properly Address User Rights</a> (Feb 19, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2009/02/26/facebooks-attempt-at-open-governance/">Facebook&#8217;s Attempt at Open Governance</a> (Feb 26, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2009/03/08/yes-privacy-does-still-exist-in-a-facebook-world/">Yes, Privacy Does Still Exist in a Facebook World</a> (March 8, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2009/03/25/photo-finder-automated-facial-recognition-on-facebook/">Photo Finder: Automated Facial Recognition on Facebook</a> (March 25, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2009/03/29/facebook-hires-aclu-privacy-lawyer-might-actually-address-privacy/">Facebook Hires ACLU Privacy Lawyer, Might Actually Address Privacy</a> (March 29, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2009/06/13/the-laws-of-social-networking/">The Laws of Social Networking: Promote Open Flows of Information, Make Privacy Hard</a> (June 13, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2009/12/03/facebooks-new-privacy-paradigm-boon-or-bust/">Facebook&#8217;s New Privacy Paradigm: Boon or Bust?</a> (Dec 3, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2009/12/09/facebooks-new-privacy-settings-to-launch-today/">Facebook’s New Privacy Settings to Launch Today</a> (Dec 9, 2009)`</li>
<li><a href="https://www.michaelzimmer.org/2009/12/10/facebooks-privacy-upgrade-is-a-downgrade-for-user-privacy/">Facebook’s Privacy Upgrade is a Downgrade for User Privacy</a> (Dec 10, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2009/12/12/facebook-provides-some-control-of-friends-list-visibility-but-hides-it/">Facebook Provides Some Control of Friends List Visibility, But Hides It</a> (Dec 12, 2009)</li>
<li><a href="https://www.michaelzimmer.org/2010/01/04/npr-groups-complain-to-ftc-about-facebook-changes/">NPR: Groups Complain To FTC About Facebook Changes</a> (Jan 4, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/01/12/zuckerbergs-remarks-arent-surprising-nor-new-nor-true/">Zuckerberg&#8217;s Remarks Aren&#8217;t Surprising, Nor New, Nor True</a> (Jan 12, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/03/29/yet-again-facebook-misunderstands-privacy/">Yet Again, Facebook Misunderstands Privacy</a> (March 29, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/05/12/another-facebook-exec-talks-about-privacy-another-set-of-gross-misunderstandings/">Another Facebook Exec Talks About Privacy; Another Set of Gross Misunderstandings</a> (May 12, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/05/14/facebooks-zuckerberg-having-two-identities-for-yourself-is-an-example-of-a-lack-of-integrity/">Facebook’s Zuckerberg: &#8220;Having two identities for yourself is an example of a lack of integrity&#8221;</a> (May 14, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/05/21/facebook-and-others-shares-identifiable-information-with-advertisers/">Facebook (and others) Shares Identifiable Information with Advertisers</a> (May 21, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/05/21/if-only-mark-zuckerberg-would-listen-to-himself/">If Only Mark Zuckerberg Would Listen to Himself</a> (May 21, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/05/24/science-friday-protecting-your-privacy-on-social-networking-sites/">Science Friday: Protecting Your Privacy On Social Networking Sites</a> (May 24, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/05/26/my-visceral-reaction-to-zuckerbergs-op-ed/">My Visceral Reaction to Zuckerberg&#8217;s Op-Ed</a> (May 26, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/05/26/true-to-form-facebook-backtracks-promises-users-more-control/">True to Form, Facebook Backtracks, Promises Users More Control (some new, and some we used to have)</a> (May 26, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/06/02/oped-how-to-win-friends-and-manipulate-people/">OpEd: How to Win Friends and Manipulate People</a> (June 2, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/06/02/baym-facebooks-views-on-privacy-are-fundamentally-naive-and-utopian/">Baym: Facebook&#8217;s Views on Privacy are “Fundamentally Naive and Utopian”</a> (June 2, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/08/20/facebook-places-privacy-falls-short/">Facebook Places Privacy Falls Short: Non-Authorized Check-Ins by Friends are Visible</a> (Aug 20, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2010/08/25/facebook-places-privacy-falls-short-part-2/">Facebook Places Privacy Falls Short, Part 2: Opting-Out</a> (Aug 25, 2010)</li>
<li><a href="https://www.michaelzimmer.org/2014/02/06/mark-zuckerbergs-theory-of-privacy/">Washington Post Essay: Mark Zuckerberg’s theory of privacy</a> (Feb 6, 2014)</li>
</ul>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6922</post-id>
		<media:content url="https://1.gravatar.com/avatar/ad8b46f4ca66c0a59497e4440cfe788c6d82435306c967f1399c9d505f7cdf47?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">michaelzimmer</media:title>
		</media:content>
	</item>
		<item>
		<title>New Books in the Information Society Series: &#8220;Protecting Children Online?&#8221; and &#8220;Authors, Users, and Pirates&#8221;</title>
		<link>https://michaelzimmer.org/2018/02/07/new-books-in-the-information-society-series/</link>
					<comments>https://michaelzimmer.org/2018/02/07/new-books-in-the-information-society-series/#comments</comments>
		
		<dc:creator><![CDATA[Michael Zimmer]]></dc:creator>
		<pubDate>Wed, 07 Feb 2018 19:37:18 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[information society series]]></category>
		<guid isPermaLink="false">http://www.michaelzimmer.org/?p=6891</guid>

					<description><![CDATA[Two new books have just been published in the “Information Society Series” at MIT Press that I co-edit with Laura DeNardis. Congrats to Tijana Milosevic and James Meese on these great contributions! Protecting Children Online? Cyberbullying Policies of Social Media Companies By Tijana Milosevic&#x2026; <p class="more-link-container th-uppercase th-text-2xs"><a href="https://michaelzimmer.org/2018/02/07/new-books-in-the-information-society-series/" class="more-link">Read More <span class="screen-reader-text">New Books in the Information Society Series: &#8220;Protecting Children Online?&#8221; and &#8220;Authors, Users, and&#160;Pirates&#8221;</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>Two new books have just been published in the “<a href="https://www.michaelzimmer.org/2012/01/24/2011/09/13/2009/03/10/information-society-series-an-interdisciplinary-book-series-on-technology-law-and-society/" target="_blank" rel="noopener">Information Society Series</a>” at <a href="http://mitpress.mit.edu/books/series/information-society-series" target="_blank" rel="noopener">MIT Press</a> that I co-edit with <a href="http://www.american.edu/soc/faculty/denardis.cfm" target="_blank" rel="noopener">Laura DeNardis</a>. Congrats to <a href="https://tijanamilosevic.org/">Tijana Milosevic</a> and <a href="https://www.uts.edu.au/staff/james.meese">James Meese</a> on these great contributions!</p>
<blockquote><p><strong><img loading="lazy" data-attachment-id="6892" data-permalink="https://michaelzimmer.org/2018/02/07/new-books-in-the-information-society-series/protecting-children-online/" data-orig-file="https://michaelzimmer.org/wp-content/uploads/2020/11/1d1f7-protecting-children-online.jpg" data-orig-size="220,332" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}" data-image-title="Protecting Children Online" data-image-description="" data-image-caption="" data-medium-file="https://michaelzimmer.org/wp-content/uploads/2020/11/1d1f7-protecting-children-online.jpg?w=199" data-large-file="https://michaelzimmer.org/wp-content/uploads/2020/11/1d1f7-protecting-children-online.jpg?w=220" class="alignright size-medium wp-image-6892" src="https://michaelzimmer.org/wp-content/uploads/2020/11/1d1f7-protecting-children-online.jpg?w=199&#038;h=300" alt="" width="199" height="300" srcset="https://michaelzimmer.org/wp-content/uploads/2020/11/1d1f7-protecting-children-online.jpg?w=199&amp;h=300 199w, https://michaelzimmer.org/wp-content/uploads/2020/11/1d1f7-protecting-children-online.jpg?w=64&amp;h=96 64w, https://michaelzimmer.org/wp-content/uploads/2020/11/1d1f7-protecting-children-online.jpg 220w" sizes="(max-width: 199px) 100vw, 199px" /><a href="https://mitpress.mit.edu/books/protecting-children-online">Protecting Children Online? Cyberbullying Policies of Social Media Companies</a></strong></p>
<p>By <a href="https://tijanamilosevic.org/">Tijana Milosevic</a><br />
Foreword by Sonia Livingstone</p>
<p><strong>Overview</strong></p>
<p>High-profile cyberbullying cases often trigger exaggerated public concern about children’s use of social media. Large companies like Facebook respond by pointing to their existing anti-bullying mechanisms or coordinate with nongovernmental organizations to organize anti-cyberbullying efforts. Do these attempts at self-regulation work? In this book, Tijana Milosevic examines the effectiveness of efforts by social media companies—including Facebook, Twitter, YouTube, Snapchat, and Instagram—to rein in cyberbullying by young users. Milosevic analyzes the anti-bullying policies of fourteen major social media companies, as recorded in companies’ corporate documents, draws on interviews with company representatives and e-safety experts, and details the roles of nongovernmental organizations examining their ability to provide critical independent advice. She draws attention to lack of transparency in how companies handle bullying cases, emphasizing the need for a continuous independent evaluation of effectiveness of companies’ mechanisms, especially from children’s perspective. Milosevic argues that cyberbullying should be viewed in the context of children’s rights and as part of the larger social problem of the culture of humiliation.</p>
<p>Milosevic looks into five digital bullying cases related to suicides, examining the pressures on the social media companies involved, the nature of the public discussion, and subsequent government regulation that did not necessarily address the problem in a way that benefits children. She emphasizes the need not only for protection but also for participation and empowerment—for finding a way to protect the vulnerable while ensuring the child’s right to participate in digital spaces.</p>
<p><strong>About the Author</strong><br />
Tijana Milosevic is a Postdoctoral Researcher in the Department of Media and Communication at the University of Oslo.</p></blockquote>
<p>&nbsp;</p>
<blockquote><p><strong><img loading="lazy" data-attachment-id="6893" data-permalink="https://michaelzimmer.org/2018/02/07/new-books-in-the-information-society-series/authors-users-pirates/" data-orig-file="https://michaelzimmer.org/wp-content/uploads/2020/11/c2126-authors-users-pirates.jpg" data-orig-size="220,334" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}" data-image-title="Authors Users Pirates" data-image-description="" data-image-caption="" data-medium-file="https://michaelzimmer.org/wp-content/uploads/2020/11/c2126-authors-users-pirates.jpg?w=198" data-large-file="https://michaelzimmer.org/wp-content/uploads/2020/11/c2126-authors-users-pirates.jpg?w=220" class="alignright size-medium wp-image-6893" src="https://michaelzimmer.org/wp-content/uploads/2020/11/c2126-authors-users-pirates.jpg?w=198&#038;h=300" alt="" width="198" height="300" srcset="https://michaelzimmer.org/wp-content/uploads/2020/11/c2126-authors-users-pirates.jpg?w=198&amp;h=301 198w, https://michaelzimmer.org/wp-content/uploads/2020/11/c2126-authors-users-pirates.jpg?w=63&amp;h=96 63w, https://michaelzimmer.org/wp-content/uploads/2020/11/c2126-authors-users-pirates.jpg 220w" sizes="(max-width: 198px) 100vw, 198px" /><a href="https://mitpress.mit.edu/books/authors-users-and-pirates">Authors, Users, and Pirates: Copyright Law and Subjectivity</a></strong></p>
<p>By <a href="https://www.uts.edu.au/staff/james.meese">James Meese</a></p>
<p><strong>Overview</strong></p>
<p>In current debates over copyright law, the author, the user, and the pirate are almost always invoked. Some in the creative industries call for more legal protection for authors; activists and academics promote user rights and user-generated content; and online pirates openly challenge the strict enforcement of copyright law. In this book, James Meese offers a new way to think about these three central subjects of copyright law, proposing a relational framework that encompasses all three. Meese views authors, users, and pirates as interconnected subjects, analyzing them as a relational triad. He argues that addressing the relationships among the three subjects will shed light on how the key conceptual underpinnings of copyright law are justified in practice.</p>
<p>Meese presents a series of historical and contemporary examples, from nineteenth-century cases of book abridgement to recent controversies over the reuse of Instagram photos. He not only considers the author, user, and pirate in terms of copyright law, but also explores the experiential element of subjectivity—how people understand and construct their own subjectivity in relation to these three subject positions. Meese maps the emergence of the author, user, and pirate over the first two centuries of copyright’s existence; describes how regulation and technological limitations turned people from creators to consumers; considers relational authorship; explores practices in sampling, music licensing, and contemporary art; examines provisions in copyright law for user-generated content; and reimagines the pirate as an innovator.</p>
<p><strong>About the Author</strong><br />
James Meese is a Lecturer in the School of Communication at the University of Technology Sydney</p></blockquote>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://michaelzimmer.org/2018/02/07/new-books-in-the-information-society-series/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6891</post-id>
		<media:content url="https://1.gravatar.com/avatar/ad8b46f4ca66c0a59497e4440cfe788c6d82435306c967f1399c9d505f7cdf47?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">michaelzimmer</media:title>
		</media:content>

		<media:content url="https://michaelzimmer.org/wp-content/uploads/2020/11/1d1f7-protecting-children-online.jpg?w=199&#038;h=300" medium="image" />

		<media:content url="https://michaelzimmer.org/wp-content/uploads/2020/11/c2126-authors-users-pirates.jpg?w=198&#038;h=300" medium="image" />
	</item>
		<item>
		<title>Seeking Postdoctoral Research Associate to Join PERVADE: Pervasive Data Ethics for Computational Research</title>
		<link>https://michaelzimmer.org/2018/02/06/seeking-postdoctoral-research-associate-to-join-pervade/</link>
					<comments>https://michaelzimmer.org/2018/02/06/seeking-postdoctoral-research-associate-to-join-pervade/#comments</comments>
		
		<dc:creator><![CDATA[Michael Zimmer]]></dc:creator>
		<pubDate>Tue, 06 Feb 2018 17:11:19 +0000</pubDate>
				<category><![CDATA[Academic]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Information Ethics]]></category>
		<category><![CDATA[Internet Research Ethics]]></category>
		<category><![CDATA[Professional]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[internet research ethics]]></category>
		<category><![CDATA[PERVADE]]></category>
		<guid isPermaLink="false">http://www.michaelzimmer.org/?p=6882</guid>

					<description><![CDATA[I am hiring a Postdoctoral Research Assistant to work on the PERVADE: Pervasive Data Ethics for Computational Research project! This is a 12-month position, with possible renewal for a 2nd year. Details below. Please join us! Position: Postdoctoral Research Assistant Project: PERVADE: Pervasive Data Ethics&#x2026; <p class="more-link-container th-uppercase th-text-2xs"><a href="https://michaelzimmer.org/2018/02/06/seeking-postdoctoral-research-associate-to-join-pervade/" class="more-link">Read More <span class="screen-reader-text">Seeking Postdoctoral Research Associate to Join PERVADE: Pervasive Data Ethics for Computational&#160;Research</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>I am hiring a Postdoctoral Research Assistant to work on the <strong><a href="http://pervade.umd.edu/">PERVADE: Pervasive Data Ethics for Computational Research</a></strong> project! This is a 12-month position, with possible renewal for a 2nd year. Details below. Please join us!</p>
<blockquote><p><a href="http://pervade.umd.edu/"><img loading="lazy" data-attachment-id="6786" data-permalink="https://michaelzimmer.org/2017/09/06/pervade-pervasive-data-ethics-for-computational-research/pervade-1/" data-orig-file="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg" data-orig-size="600,350" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="pervade-1" data-image-description="" data-image-caption="" data-medium-file="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=300" data-large-file="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=600" class="alignright wp-image-6786 size-medium" src="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=300&#038;h=175" alt="" width="300" height="175" srcset="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=300&amp;h=175 300w, https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=128&amp;h=75 128w, https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg 600w" sizes="(max-width: 300px) 100vw, 300px" /></a>Position: <strong>Postdoctoral Research Assistant</strong><br />
Project: <strong>PERVADE: Pervasive Data Ethics for Computational Research</strong><br />
Faculty Advisor: <strong>Dr. Michael Zimmer</strong></p>
<p>The School of Information Studies at the University of Wisconsin-Milwaukee is accepting applications for a Postdoctoral Research Associate to work with Dr. Michael Zimmer on the NSF-funded PERVADE: Pervasive Data Ethics for Computational Research project (<a href="https://pervade.umd.edu/)">https://pervade.umd.edu/)</a>.</p>
<p>The position will be under the supervision of Dr. Michael Zimmer, Associate Professor and Director of the Center for Information Policy Research. Along with continuing their own research agenda, the Postdoctoral Research Associate will work alongside Dr. Zimmer and other PERVADE team members to pursue various aspects of the larger project, including empirical investigations of computational researchers working with pervasive data sets, user communities impacted by pervasive data, and regulators responding to ethical issues with big data research.</p>
<p>The postdoctoral position is designed for recent PhDs who are engaged in research on data ethics, internet research ethics, or other areas aligned with the objectives of the PERVADE project. Recent PhDs in information ethics &amp; policy, critical information studies, internet studies, social media, and digital privacy are also encouraged to apply. Experience with empirical methods is required; experience with either qualitative or quantitative methods of inquiry is welcome. Ideal candidates will have a strong publication record and demonstrated success working on teams.</p>
<p>The postdoc is a full-time, 12-month position starting August 20, 2018, with possible renewal for a 2nd year. The Postdoctoral Research Associate will receive a salary of USD $48,900 per year plus benefits, access to travel funds, and office space in the Center for Information Policy Research. The stipend and benefits eligibility are subject to UW System policies.</p>
<p>Applicants who do not yet hold a PhD but expect to have it by August 2018 will be asked to provide a letter from their home institution corroborating the degree award schedule. Verification of completion of degree will be required before the start date.</p>
<p>Applications should include a letter of interest, CV, a writing sample, and the name and contact information of three references. All materials should be sent in a single PDF file to Dr. Michael Zimmer (<a href="mailto:zimmerm@uwm.edu">zimmerm@uwm.edu</a>) by April 1, 2018.</p>
<p>For more information, please contact Dr. Michael Zimmer (<a href="mailto:zimmerm@uwm.edu">zimmerm@uwm.edu</a>).</p>
<p>UWM is an AA/EEO Employer</p></blockquote>
]]></content:encoded>
					
					<wfw:commentRss>https://michaelzimmer.org/2018/02/06/seeking-postdoctoral-research-associate-to-join-pervade/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6882</post-id>
		<media:content url="https://1.gravatar.com/avatar/ad8b46f4ca66c0a59497e4440cfe788c6d82435306c967f1399c9d505f7cdf47?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">michaelzimmer</media:title>
		</media:content>

		<media:content url="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=300&#038;h=175" medium="image" />
	</item>
		<item>
		<title>Announcing the Web Science 2018 Ethics Workshop</title>
		<link>https://michaelzimmer.org/2018/01/27/announcing-the-web-science-2018-ethics-workshop/</link>
		
		<dc:creator><![CDATA[Michael Zimmer]]></dc:creator>
		<pubDate>Sat, 27 Jan 2018 14:57:14 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[Internet Research Ethics]]></category>
		<category><![CDATA[data ethics]]></category>
		<category><![CDATA[internet research ethics]]></category>
		<category><![CDATA[websci]]></category>
		<guid isPermaLink="false">http://www.michaelzimmer.org/?p=6865</guid>

					<description><![CDATA[Along with my co-organizers, Charles Ess and Anja Bechmann, I&#8217;m excited to announce the Web Science 2018 Ethics Workshop: “Confronting Ethical Challenges in Web Science Research“, scheduled for Sunday 27 May 2018 at VU Amsterdam. This half-day workshop, organized by&#x2026; <p class="more-link-container th-uppercase th-text-2xs"><a href="https://michaelzimmer.org/2018/01/27/announcing-the-web-science-2018-ethics-workshop/" class="more-link">Read More <span class="screen-reader-text">Announcing the Web Science 2018 Ethics&#160;Workshop</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" data-attachment-id="6866" data-permalink="https://michaelzimmer.org/2018/01/27/announcing-the-web-science-2018-ethics-workshop/websci18-logo/" data-orig-file="https://michaelzimmer.org/wp-content/uploads/2020/11/5f51a-websci18-logo.png" data-orig-size="300,231" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="websci18-logo" data-image-description="" data-image-caption="" data-medium-file="https://michaelzimmer.org/wp-content/uploads/2020/11/5f51a-websci18-logo.png?w=300" data-large-file="https://michaelzimmer.org/wp-content/uploads/2020/11/5f51a-websci18-logo.png?w=300" class="alignright  wp-image-6866" src="https://michaelzimmer.org/wp-content/uploads/2020/11/5f51a-websci18-logo.png?w=300&#038;h=231" alt="" width="236" height="182" srcset="https://michaelzimmer.org/wp-content/uploads/2020/11/5f51a-websci18-logo.png?w=236&amp;h=182 236w, https://michaelzimmer.org/wp-content/uploads/2020/11/5f51a-websci18-logo.png?w=125&amp;h=96 125w, https://michaelzimmer.org/wp-content/uploads/2020/11/5f51a-websci18-logo.png 300w" sizes="(max-width: 236px) 100vw, 236px" />Along with my co-organizers, <a href="http://www.hf.uio.no/imk/english/people/aca/charlees/index.html">Charles Ess</a> and <a href="http://pure.au.dk/portal/en/persons/anja-bechmann(b093426c-3157-465e-bd29-fe73ee20d446).html">Anja Bechmann</a>, I&#8217;m excited to announce the <a href="https://websci18ethicsworkshop.wordpress.com/">Web Science 2018 Ethics Workshop: “Confronting Ethical Challenges in Web Science Research“</a>, scheduled for Sunday 27 May 2018 at VU Amsterdam.</p>
<p>This half-day workshop, organized by the <a href="https://aoir.org/ethics/" target="_blank" rel="noopener">Association of Internet Researchers (AoIR) Ethics Working Group</a> in partnership with the <a href="https://pervade.umd.edu/" target="_blank" rel="noopener">PERVADE: Pervasive Data Ethics project</a>, will foster community engagement with the ethical challenges faced by web science researchers working with big data sources, including from social media platforms, health apps, internet of things, and related pervasive data sets.</p>
<p>The growing prevalence of data-rich networked information technologies, such as the internet of things, wearable devices, ubiquitous sensing, and social sharing platforms, brings a similar increase in the flow of rich, deep, and often identifiable personal information. These data flows— across devices, platforms, and between users—are increasingly available to computational and web science researchers to capture and process to discover new insights about how all these domains intersect. The growth in the scale, scope, speed, and depth of data-intensive computational activities, however, requires that we continuously confront the ethical frameworks and assumptions that guide web science research agenda now, and in the future.</p>
<p>Please read our <a href="https://websci18ethicsworkshop.wordpress.com/call-for-papers/">call for papers</a> and <a href="https://websci18ethicsworkshop.wordpress.com/schedule/">workshop schedule</a> for more information.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6865</post-id>
		<media:content url="https://1.gravatar.com/avatar/ad8b46f4ca66c0a59497e4440cfe788c6d82435306c967f1399c9d505f7cdf47?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">michaelzimmer</media:title>
		</media:content>

		<media:content url="https://michaelzimmer.org/wp-content/uploads/2020/11/5f51a-websci18-logo.png?w=300&#038;h=231" medium="image" />
	</item>
		<item>
		<title>Funded PhD Position to Join PERVADE: Pervasive Data Ethics for Computational Research</title>
		<link>https://michaelzimmer.org/2017/10/09/funded-phd-position-to-join-pervade-pervasive-data-ethics-for-computational-research/</link>
		
		<dc:creator><![CDATA[Michael Zimmer]]></dc:creator>
		<pubDate>Mon, 09 Oct 2017 18:16:45 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Information Ethics]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Internet Research Ethics]]></category>
		<category><![CDATA[Professional]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[internet research]]></category>
		<category><![CDATA[internet research ethics]]></category>
		<category><![CDATA[PERVADE]]></category>
		<guid isPermaLink="false">http://www.michaelzimmer.org/?p=6803</guid>

					<description><![CDATA[[Note: this PhD position is no longer available. See recent posting for a Postdoctoral Research Associate here] Are you a graduate student interested in big data, data ethics, internet research, or internet research ethics? Are you looking for a funded&#x2026; <p class="more-link-container th-uppercase th-text-2xs"><a href="https://michaelzimmer.org/2017/10/09/funded-phd-position-to-join-pervade-pervasive-data-ethics-for-computational-research/" class="more-link">Read More <span class="screen-reader-text">Funded PhD Position to Join PERVADE: Pervasive Data Ethics for Computational&#160;Research</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><em><span style="color:#993300;">[<strong>Note:</strong> this PhD position is no longer available. See recent posting for a <a href="https://www.michaelzimmer.org/2018/02/06/seeking-postdoctoral-research-associate-to-join-pervade/"><strong>Postdoctoral Research Associate here</strong></a>]</span></em></p>
<p>Are you a graduate student interested in big data, data ethics, internet research, or internet research ethics?</p>
<p>Are you looking for a funded PhD opportunity to explore these issues?</p>
<p><img loading="lazy" data-attachment-id="6786" data-permalink="https://michaelzimmer.org/2017/09/06/pervade-pervasive-data-ethics-for-computational-research/pervade-1/" data-orig-file="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg" data-orig-size="600,350" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="pervade-1" data-image-description="" data-image-caption="" data-medium-file="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=300" data-large-file="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=600" class="alignright wp-image-6786" src="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=300&#038;h=175" alt="" width="213" height="124" srcset="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=213&amp;h=124 213w, https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=426&amp;h=249 426w, https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=128&amp;h=75 128w, https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=300&amp;h=175 300w" sizes="(max-width: 213px) 100vw, 213px" />Then, <strong>join me</strong> at <a href="http://uwm.edu/informationstudies/">UW-Milwaukee</a> to work on the <strong><a href="http://pervade.umd.edu/">PERVADE: Pervasive Data Ethics for Computational Research</a></strong> project! Details for this <strong>fully-funded</strong> <strong>PhD</strong> <strong>research assistant position</strong> are below.</p>
<p><a href="http://uwm.edu/informationstudies/academics/doctoral/phd/">Application</a> deadline for the <a href="http://uwm.edu/informationstudies/academics/doctoral/">UW-Milwaukee School of Information Studies </a>PhD program is January 15, 2018.</p>
<blockquote><p>University of Wisconsin-Milwaukee<br />
School of Information Studies</p>
<p>Project: <strong>PERVADE: Pervasive Data Ethics for Computational Research</strong><br />
Faculty Advisor: <strong>Dr. Michael Zimmer</strong></p>
<p>Funding Opportunity: <strong>Graduate Research Assistant</strong><br />
Funding Details: <strong>50% annual appointment</strong> (includes monthly stipend, tuition remission, eligible for benefits, access to travel funding; renewable for up to 4 years)</p>
<p>The School of Information Studies at the University of Wisconsin-Milwaukee invites applications for an incoming Ph.D. student with interests in data ethics, information ethics, or internet research ethics to work with Dr. Michael Zimmer on the NSF-funded PERVADE: Pervasive Data Ethics for Computational Research project (<a href="https://pervade.umd.edu/" rel="nofollow">https://pervade.umd.edu/</a>). Students interested in information policy, critical information studies, internet studies, social media, and digital privacy are also encouraged to apply.</p>
<p>The incoming student will be under the supervision of Dr. Michael Zimmer, Associate Professor and Director of the Center for Information Policy Research. Among the student&#8217;s responsibilities will be to assist Dr. Zimmer in various aspects of the PERVADE project, including project management activities, supervising undergraduate assistants, data collection, coding and analysis, and other tasks as assigned. The student will also assist with literature reviews, manuscript preparation, and dissemination of results, including conference presentations and publication opportunities.</p>
<p>The incoming student will be funded on a 50% annual Research Assistant appointment (renewable for up to four years), which includes tuition remission, a monthly stipend (including summer), and eligibility for university benefits. Full details of UW-Milwaukee graduate assistant policies are available at <a href="http://uwm.edu/graduateschool/graduate-assistant-policies-procedures/" rel="nofollow">http://uwm.edu/graduateschool/graduate-assistant-policies-procedures/</a>. The student will also have the opportunity to access funds for conference travel and related research expenses, and integrate with the broader PhD student cohort at the School of Information Studies.</p>
<p>Interested students must apply directly to the Ph.D. Program in Information Studies, and in their cover letter should (1) specifically indicate they are applying for the PERVADE graduate research assistant position, and (2) demonstrate their fit for the project. Students should also contact Dr. Michael Zimmer directly at zimmerm@uwm.edu to indicate they are applying for the PERVADE research assistant position. Applicants must meet Graduate School requirements plus SOIS requirements to be considered for admission to the Ph.D. program. Application deadline is January 15, 2018.</p>
<p>Additional information about the Ph.D. program in in Information Studies can be found at http://uwm.edu/informationstudies/academics/doctoral/, and application requirements are available at <a href="http://uwm.edu/informationstudies/academics/doctoral/phd/?target=admission" rel="nofollow">http://uwm.edu/informationstudies/academics/doctoral/phd/?target=admission</a>.</p></blockquote>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6803</post-id>
		<media:content url="https://1.gravatar.com/avatar/ad8b46f4ca66c0a59497e4440cfe788c6d82435306c967f1399c9d505f7cdf47?s=96&#38;d=https%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">michaelzimmer</media:title>
		</media:content>

		<media:content url="https://michaelzimmer.org/wp-content/uploads/2020/11/a325f-pervade-1.jpg?w=300&#038;h=175" medium="image" />
	</item>
	</channel>
</rss>
